{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:30:11Z","timestamp":1750307411940,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,4,26]],"date-time":"2010-04-26T00:00:00Z","timestamp":1272240000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,4,26]]},"DOI":"10.1145\/1772690.1772742","type":"proceedings-article","created":{"date-parts":[[2010,4,27]],"date-time":"2010-04-27T12:45:48Z","timestamp":1272372348000},"page":"501-510","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["Large-scale bot detection for search engines"],"prefix":"10.1145","author":[{"given":"Hongwen","family":"Kang","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Kuansan","family":"Wang","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]},{"given":"David","family":"Soukal","sequence":"additional","affiliation":[{"name":"Microsoft, Redmond, WA, USA"}]},{"given":"Fritz","family":"Behr","sequence":"additional","affiliation":[{"name":"Microsoft, Redmond, WA, USA"}]},{"given":"Zijian","family":"Zheng","sequence":"additional","affiliation":[{"name":"Microsoft, Redmond, WA, USA"}]}],"member":"320","published-online":{"date-parts":[[2010,4,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/LAWEB.2005.23"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/340534.340671"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/279943.279962"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1451983.1451985"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00570-1_1"},{"volume-title":"The MIT Press","year":"2006","author":"Chapelle O.","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"N. V. Chawla and G. J. Karakoulas. Learning from labeled and unlabeled data: An empirical study across techniques and domains. J. Artif. Intell. Res. (JAIR) 23:331--366 2005.   N. V. Chawla and G. J. Karakoulas. Learning from labeled and unlabeled data: An empirical study across techniques and domains. J. Artif. Intell. Res. (JAIR) 23:331--366 2005.","DOI":"10.1613\/jair.1509"},{"volume-title":"Microsoft Research","year":"1994","author":"Chickering D.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1968.1054142"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF03325089"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1323128.1323139"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1977.tb01600.x"},{"key":"e_1_3_2_1_13_1","first-page":"80","volume-title":"Proceedings of the ICML 2003 Workshop: The Continuum from Labeled to Unlabeled Data","author":"Denis F.","year":"2003"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1458082.1458095"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/0169-7552(95)00107-3"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007465528199"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"G. Fung and O. Mangasarian. Semi-supervised support vector machines for unlabeled data classification 2001.  G. Fung and O. Mangasarian. Semi-supervised support vector machines for unlabeled data classification 2001.","DOI":"10.1080\/10556780108805809"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Z. Ghahramani. An introduction to hidden markov models and bayesian networks. pages 9--42 2002.   Z. Ghahramani. An introduction to hidden markov models and bayesian networks. pages 9--42 2002.","DOI":"10.1142\/S0218001401000836"},{"key":"e_1_3_2_1_19_1","first-page":"327","volume-title":"ICML '00: Proceedings of the Seventeenth International Conference on Machine Learning","author":"Goldman S. A.","year":"2000"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"D. Heckerman. A tutorial on learning with bayesian networks. pages 301--354 1999.  D. Heckerman. A tutorial on learning with bayesian networks. pages 301--354 1999.","DOI":"10.1007\/978-94-011-5014-9_11"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/347319.346311"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/645528.657646"},{"volume-title":"MIT Press","year":"2009","author":"Koller D.","key":"e_1_3_2_1_24_1"},{"key":"e_1_3_2_1_25_1","unstructured":"M. Koster. Robots in the web: threat or treat ? ConneXions 9(4) April 1995.  M. Koster. Robots in the web: threat or treat ? ConneXions 9(4) April 1995."},{"key":"e_1_3_2_1_26_1","first-page":"448","volume-title":"ICML","author":"Lee W. S.","year":"2003"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/645531.656022"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1328964.1328974"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/354756.354805"},{"key":"e_1_3_2_1_30_1","unstructured":"N. Provos. The reason behind \"we're sorry ...\" message. http:\/\/googleonlinesecurity.blogspot.com\/2007\/07\/reason-behind-were-sorry-message.html July 2007.  N. Provos. The reason behind \"we're sorry ...\" message. http:\/\/googleonlinesecurity.blogspot.com\/2007\/07\/reason-behind-were-sorry-message.html July 2007."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1179542.1179544"},{"volume-title":"Morgan Kaufmann Publishers Inc.","year":"1993","author":"Quinlan J. R.","key":"e_1_3_2_1_32_1"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"L. R. Rabiner. A tutorial on hidden markov models and selected applications in speech recognition. pages 267--296 1990.   L. R. Rabiner. A tutorial on hidden markov models and selected applications in speech recognition. pages 267--296 1990.","DOI":"10.1016\/B978-0-08-051584-7.50027-9"},{"volume-title":"University of Waikato","year":"2004","author":"Remco R. B.","key":"e_1_3_2_1_34_1"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.3115\/1119176.1119180"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACVMOT.2005.107"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367617"},{"volume-title":"University of Edinburgh","year":"2001","author":"Seeger M.","key":"e_1_3_2_1_38_1"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.09.021"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013228602957"},{"volume-title":"Wiley-Interscience","year":"1998","author":"Vapnik V. N.","key":"e_1_3_2_1_41_1"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.5555\/1766171.1766196"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/507338.507355"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.3115\/981658.981684"},{"key":"e_1_3_2_1_45_1","first-page":"321","volume-title":"NSDI'09: Proceedings of the 6th USENIX symposium on Networked systems design and implementation","author":"Zhao Y.","year":"2009"},{"key":"e_1_3_2_1_47_1","first-page":"58","volume-title":"ICML 2003 workshop on The Continuum from Labeled to Unlabeled Data in Machine Learning and Data Mining","author":"Zhu X.","year":"2003"}],"event":{"name":"WWW '10: The 19th International World Wide Web Conference","acronym":"WWW '10","location":"Raleigh North Carolina USA"},"container-title":["Proceedings of the 19th international conference on World wide web"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1772690.1772742","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1772690.1772742","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:39:34Z","timestamp":1750246774000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1772690.1772742"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,4,26]]},"references-count":45,"alternative-id":["10.1145\/1772690.1772742","10.1145\/1772690"],"URL":"https:\/\/doi.org\/10.1145\/1772690.1772742","relation":{},"subject":[],"published":{"date-parts":[[2010,4,26]]},"assertion":[{"value":"2010-04-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}